/freebsd-current/crypto/openssl/crypto/evp/ |
H A D | evp_pbe.c | 89 int EVP_PBE_CipherInit_ex(ASN1_OBJECT *pbe_obj, const char *pass, int passlen, argument 114 if (pass == NULL) 117 passlen = strlen(pass); 151 ret = keygen_ex(ctx, pass, passlen, param, cipher, md, en_de, libctx, propq); 153 ret = keygen(ctx, pass, passlen, param, cipher, md, en_de); 162 int EVP_PBE_CipherInit(ASN1_OBJECT *pbe_obj, const char *pass, int passlen, argument 165 return EVP_PBE_CipherInit_ex(pbe_obj, pass, passlen, param, ctx, en_de, NULL, NULL);
|
/freebsd-current/crypto/openssl/apps/ |
H A D | pkcs8.c | 45 {"passin", OPT_PASSIN, 's', "Input file pass phrase source"}, 52 {"passout", OPT_PASSOUT, 's', "Output file pass phrase source"}, 81 char pass[APP_PASS_LEN]; local 268 p8pass = pass; 270 (pass, sizeof(pass), "Enter Encryption Password:", 1)) { 329 p8pass = pass; 330 if (EVP_read_pw_string(pass, sizeof(pass), "Enter Password:", 0)) {
|
H A D | pkcs12.c | 41 const char *pass, int passlen, int options, 44 const char *pass, int passlen, int options, 47 const char *pass, int passlen, 81 {"passin", OPT_PASSIN, 's', "Input file pass phrase source"}, 82 {"passout", OPT_PASSOUT, 's', "Output file pass phrase source"}, 116 {"passcerts", OPT_PASSCERTS, 's', "Certificate file pass phrase source"}, 161 char pass[PASSWD_BUF_SIZE] = "", macpass[PASSWD_BUF_SIZE] = ""; local 495 cpass = pass; 652 if (EVP_read_pw_string(pass, sizeof(pass), 836 dump_certs_keys_p12(BIO *out, const PKCS12 *p12, const char *pass, int passlen, int options, char *pempass, const EVP_CIPHER *enc) argument 881 dump_certs_pkeys_bags(BIO *out, const STACK_OF(PKCS12_SAFEBAG) *bags, const char *pass, int passlen, int options, char *pempass, const EVP_CIPHER *enc) argument 895 dump_certs_pkeys_bag(BIO *out, const PKCS12_SAFEBAG *bag, const char *pass, int passlen, int options, char *pempass, const EVP_CIPHER *enc) argument [all...] |
/freebsd-current/crypto/openssl/providers/implementations/kdfs/ |
H A D | pkcs12kdf.c | 38 unsigned char *pass; member in struct:__anon4167 48 static int pkcs12kdf_derive(const unsigned char *pass, size_t passlen, argument 93 *p++ = pass[i % passlen]; 158 OPENSSL_clear_free(ctx->pass, ctx->pass_len); 209 if (ctx->pass == NULL) { 220 return pkcs12kdf_derive(ctx->pass, ctx->pass_len, ctx->salt, ctx->salt_len, 237 if (!pkcs12kdf_set_membuf(&ctx->pass, &ctx->pass_len, p))
|
/freebsd-current/contrib/bmake/ |
H A D | targ.c | 478 Targ_PrintNode(GNode *gn, int pass) argument 492 if (pass >= 2) { 525 Targ_PrintNodes(&gn->cohorts, pass); 529 Targ_PrintNodes(GNodeList *gnodes, int pass) argument 534 Targ_PrintNode(ln->datum, pass); 555 * pass 1 => before processing 560 Targ_PrintGraph(int pass) argument 563 Targ_PrintNodes(&allTargets, pass);
|
/freebsd-current/contrib/ncurses/ncurses/tinfo/ |
H A D | alloc_ttype.c | 531 int pass; local 555 for (pass = 0; pass < 2; ++pass) { 558 if (pass) { 568 if (pass) { 577 if (pass) { 637 for (pass = 0; pass < 2; ++pass) { [all...] |
/freebsd-current/contrib/llvm-project/clang/lib/ARCMigrate/ |
H A D | TransZeroOutPropsInDealloc.cpp | 37 ZeroOutInDeallocRemover(MigrationPass &pass) : Pass(pass), SelfD(nullptr) { argument 221 void trans::removeZeroOutPropsInDeallocFinalize(MigrationPass &pass) { argument 222 ZeroOutInDeallocRemover trans(pass); 223 trans.TraverseDecl(pass.Ctx.getTranslationUnitDecl());
|
H A D | TransAutoreleasePool.cpp | 71 AutoreleasePoolRewriter(MigrationPass &pass) argument 72 : Body(nullptr), Pass(pass) { 73 PoolII = &pass.Ctx.Idents.get("NSAutoreleasePool"); 74 DrainSel = pass.Ctx.Selectors.getNullarySelector( 75 &pass.Ctx.Idents.get("drain")); 432 void trans::rewriteAutoreleasePool(MigrationPass &pass) { argument 433 BodyTransform<AutoreleasePoolRewriter> trans(pass); 434 trans.TraverseDecl(pass.Ctx.getTranslationUnitDecl());
|
/freebsd-current/sys/contrib/libsodium/src/libsodium/crypto_pwhash/argon2/ |
H A D | argon2-fill-block-avx2.c | 111 input_block.v[0] = position->pass; 162 (position.pass != 0 || position.slice >= ARGON2_SYNC_POINTS / 2)) { 174 if ((0 == position.pass) && (0 == position.slice)) { 214 if ((position.pass == 0) && (position.slice == 0)) { 230 if (position.pass != 0) {
|
H A D | argon2-fill-block-avx512f.c | 116 input_block.v[0] = position->pass; 167 (position.pass != 0 || position.slice >= ARGON2_SYNC_POINTS / 2)) { 179 if ((0 == position.pass) && (0 == position.slice)) { 219 if ((position.pass == 0) && (position.slice == 0)) { 235 if (position.pass != 0) {
|
H A D | argon2-fill-block-ref.c | 122 input_block.v[0] = position->pass; 160 (position.pass != 0 || position.slice >= ARGON2_SYNC_POINTS / 2)) { 172 if ((0 == position.pass) && (0 == position.slice)) { 209 if ((position.pass == 0) && (position.slice == 0)) { 225 if (position.pass != 0) {
|
H A D | argon2-fill-block-ssse3.c | 110 input_block.v[0] = position->pass; 161 (position.pass != 0 || position.slice >= ARGON2_SYNC_POINTS / 2)) { 173 if ((0 == position.pass) && (0 == position.slice)) { 213 if ((position.pass == 0) && (position.slice == 0)) { 229 if (position.pass != 0) {
|
/freebsd-current/crypto/openssl/apps/lib/ |
H A D | tlssrp_depr.c | 106 char *pass = app_malloc(PWD_STRLEN + 1, "SRP password buffer"); local 112 if ((l = password_callback(pass, PWD_STRLEN, 0, &cb_tmp)) < 0) { 114 OPENSSL_free(pass); 117 *(pass + l) = '\0'; 119 return pass;
|
/freebsd-current/lib/libpam/modules/pam_radius/ |
H A D | pam_radius.c | 79 const char *pass, const char *nas_id, const char *nas_ipaddr, 103 (pass != NULL && 104 rad_put_string(radh, RAD_USER_PASSWORD, pass) == -1) || 298 const char *user, *pass; local 316 retval = pam_get_authtok(pamh, PAM_AUTHTOK, &pass, PASSWORD_PROMPT); 338 if (build_access_request(radh, user, pass, nas_id, nas_ipaddr, rhost, 78 build_access_request(struct rad_handle *radh, const char *user, const char *pass, const char *nas_id, const char *nas_ipaddr, const char *rhost, const void *state, size_t state_len) argument
|
/freebsd-current/contrib/arm-optimized-routines/string/test/ |
H A D | strchr.c | 115 char *pass = funtab[i].test_mte && mte_enabled () ? "MTE PASS" : "PASS"; local 116 printf ("%s %s\n", err_count ? "FAIL" : pass, funtab[i].name);
|
H A D | memrchr.c | 100 char *pass = funtab[i].test_mte && mte_enabled () ? "MTE PASS" : "PASS"; local 101 printf ("%s %s\n", err_count ? "FAIL" : pass, funtab[i].name);
|
H A D | memchr.c | 104 char *pass = funtab[i].test_mte && mte_enabled () ? "MTE PASS" : "PASS"; local 105 printf ("%s %s\n", err_count ? "FAIL" : pass, funtab[i].name);
|
H A D | strrchr.c | 115 char *pass = funtab[i].test_mte && mte_enabled () ? "MTE PASS" : "PASS"; local 116 printf ("%s %s\n", err_count ? "FAIL" : pass, funtab[i].name);
|
H A D | strnlen.c | 103 char *pass = funtab[i].test_mte && mte_enabled () ? "MTE PASS" : "PASS"; local 104 printf ("%s %s\n", err_count ? "FAIL" : pass, funtab[i].name);
|
H A D | memcpy.c | 120 char *pass = funtab[i].test_mte && mte_enabled () ? "MTE PASS" : "PASS"; local 121 printf ("%s %s\n", err_count ? "FAIL" : pass, funtab[i].name);
|
/freebsd-current/sys/tests/fib_lookup/ |
H A D | fib_lookup.c | 169 for (int pass = 0; pass < tries; pass++) { 203 for (int pass = 0; pass < count / CHUNK_SIZE; pass++) { 234 for (int pass = 0; pass < tries; pass++) { 268 for (int pass [all...] |
/freebsd-current/crypto/openssl/test/ |
H A D | endecode_test.c | 134 const char *pass, const char *pcipher); 138 const char *keytype, int selection, const char *pass); 153 const char *pass, const char *pcipher, 172 output_type, output_structure, pass, pcipher))) 179 selection, pass))) 188 selection, pass)) 194 0, pass))) 196 output_type, output_structure, pass, pcipher))) 216 if ((pass == NULL && pcipher == NULL) 243 const char *pass, cons 149 test_encode_decode(const char *file, const int line, const char *type, EVP_PKEY *pkey, int selection, const char *output_type, const char *output_structure, const char *pass, const char *pcipher, encoder *encode_cb, decoder *decode_cb, tester *test_cb, checker *check_cb, dumper *dump_cb, int flags) argument 238 encode_EVP_PKEY_prov(const char *file, const int line, void **encoded, long *encoded_len, void *object, int selection, const char *output_type, const char *output_structure, const char *pass, const char *pcipher) argument 279 decode_EVP_PKEY_prov(const char *file, const int line, void **object, void *encoded, long encoded_len, const char *input_type, const char *structure_type, const char *keytype, int selection, const char *pass) argument 354 encode_EVP_PKEY_legacy_PEM(const char *file, const int line, void **encoded, long *encoded_len, void *object, ossl_unused int selection, ossl_unused const char *output_type, ossl_unused const char *output_structure, const char *pass, const char *pcipher) argument 394 encode_EVP_PKEY_MSBLOB(const char *file, const int line, void **encoded, long *encoded_len, void *object, int selection, ossl_unused const char *output_type, ossl_unused const char *output_structure, ossl_unused const char *pass, ossl_unused const char *pcipher) argument 439 encode_EVP_PKEY_PVK(const char *file, const int line, void **encoded, long *encoded_len, void *object, int selection, ossl_unused const char *output_type, ossl_unused const char *output_structure, const char *pass, ossl_unused const char *pcipher) argument 712 static const char *pass = "the holy handgrenade of antioch"; variable [all...] |
/freebsd-current/contrib/kyua/engine/ |
H A D | atf_helpers.cpp | 269 ATF_TEST_CASE(pass); variable 270 ATF_TEST_CASE_HEAD(pass) 274 ATF_TEST_CASE_BODY(pass) 408 ADD_TEST_CASE(tcs, filters, pass);
|
/freebsd-current/contrib/tnftp/src/ |
H A D | util.c | 148 "Connecting via pass-through server %s\n", 382 char *fuser, *pass, *facct, *p; local 388 fuser = pass = facct = NULL; 392 pass = ftp_strdup(lpass); 394 DPRINTF("ftp_login: user `%s' pass `%s' host `%s'\n", 395 STRorNULL(fuser), STRorNULL(pass), STRorNULL(host)); 403 FREEPTR(pass); 404 pass = ftp_strdup(getoptionvalue("anonpass")); 407 if (ruserpass(host, &fuser, &pass, &facct) < 0) { 445 if (pass [all...] |
/freebsd-current/crypto/heimdal/appl/ftp/ftpd/ |
H A D | extern.h | 83 void pass(char *);
|